16 p. 30 x 30 cm
Topic: Symmetric functions
30
30
Sep 20, 2016
09/16
by
Ostrowski, A. M.
texts
eye 30
favorite 0
comment 0
Topic: Symmetric matrices
Topic: Symmetric functions
3
3.0
Jan 9, 2021
01/21
by
Flensted-Jensen, Mogens, 1942-
texts
eye 3
favorite 0
comment 0
x, 77 p. ; 26 cm
Topic: Symmetric spaces
Topic: Symmetric functions.
572
572
Sep 7, 2008
09/08
by
Decker, Floyd Fiske, 1881-
texts
eye 572
favorite 0
comment 0
Book digitized by Google from the library of Harvard University and uploaded to the Internet Archive by user tpb.
Topic: Symmetric functions
Source: http://books.google.com/books?id=TKYKAAAAYAAJ&oe=UTF-8
3
3.0
Jul 27, 2019
07/19
by
Loos, Ottmar
texts
eye 3
favorite 0
comment 0
2 v. 24 cm
Topic: Symmetric spaces
2
2.0
Jul 27, 2019
07/19
by
Loos, Ottmar
texts
eye 2
favorite 0
comment 0
2 v. 24 cm
Topic: Symmetric spaces
19
19
Jul 25, 2013
07/13
by
Nathan Rae
audio
eye 19
favorite 0
comment 0
Steve and Leo continue their ongoing tour of fundamental crypto technology by describing the operation of Symmetric Block Ciphers.
Topic: Symmetric Block Ciphers
The present article shows the relation between symmetric generalized biderivations with orthogonality on semiprime rings and showed the orthogonality results. For and be two generalized symmetric biderivations of , then the following conditions are equivalent : · Generalized symmetric biderivations and are orthogonal. · For all , the following relations hold · + · . · . ·...
Topics: Semiprime Ring, Symmetric Biderivation, Generalized symmetric Biderivation & Orthogonal...
190
190
Nov 15, 2014
11/14
by
Ahuka
audio
eye 190
favorite 0
comment 0
Summary: This episode looks the two kinds of encryption keys, and why to use each one. Series: Privacy and Security Source: http://hackerpublicradio.org/eps.php?id=1640 Previously we looked at Public Key encryption, which is also called Asymmetric Encryption because it uses two different keys for the encryption and decryption. This allows us to solve one of the biggest problems in secure encrypted communication, which is key distribution. Because the public key can be freely distributed, you...
Topics: symmetric, asymmetric, encryption
67
67
Mar 5, 2012
03/12
by
Schwarz, Hans Rudolf, 1930-
texts
eye 67
favorite 2
comment 0
Translation of Numerik symmetrischer Matrizen
Topics: Symmetric matrices, Numerical analysis
"Supported in part by the Advanced Research Projects Agency of the Department of Defense and ... monitored by the U.S. Army Research Office-Durham under contract no. DAHCO4-72-C-0001."
Topics: Eigenvalues, Symmetric matrices, Eigenvectors
"Supported in part by the Advanced Research Projects Agency of the Department of Defense and ... monitored by the U.S. Army Research Office-Durham under contract no. DAHCO4-72-C-0001."
Topics: Eigenvalues, Symmetric matrices, Eigenvectors
43
43
Nov 19, 2015
11/15
by
V. Christianto, F. Smarandache
texts
eye 43
favorite 0
comment 0
In the context of some recent papers suggesting CT-symmetric QM in order to generalize PT-symmetric QM, in this paper we present an idea that there is quite compelling reasoning to argue in favour of supersymmetric extension of Klein-Gordon equation. Its numerical solutions in some simplest conditions are presented. Since the potential corresponding to this supersymmetric KGE is neither Coulomb,Yukawa, nor Hulthen potential [2a], then one can expect to observe a new type of matter, which may be...
Topics: supersymmetric extension, CT-symmetric QM
48
48
Oct 7, 2019
10/19
by
Walser, Hans
texts
eye 48
favorite 1
comment 0
xii, 95 p. : 23 cm
Topics: Symmetry, Symmetric functions, Geometry, Differential
Journal of Research of the National Bureau of Standards
Topics: Commutator, matrix, orthogonal, skew-symmetric
2
2.0
texts
eye 2
favorite 0
comment 0
Multilevel inverters offers less distortion and less electro-magnetic interference compared with other conventional inverters and hence, it can be used in many industrial and commercial applications. This paper analyze the performance of the modified single phase seven level symmetrical inverter using minimum number of switches. The proposed topology consists of six switches and two dc sources, and produces seven level output voltage waveform during symmetric operation. The cost and size of the...
Topics: Asymmetric, Inverter, Multilevel, Symmetric, THD
84
84
texts
eye 84
favorite 0
comment 0
We use the Maple system to check the investigations of S. S. Gupta regarding the Smarandache consecutive and the reversed Smarandache sequences of triangular numbers [Smarandache Notions Journal, Vol. 14, 2004, pp. 366–368]. Furthermore, we extend previous investigations to the mirror and symmetric Smarandache sequences of triangular numbers.
Topics: symmetric Smarandache sequences, triangular numbers
Bell System Technical Journal, 53: 5. May-June 1974 pp 801-826. A Map Technique for Identifying Variables of Symmetry. (Goodrich, L.M.)
Topics: function, variables, symmetric, technique, functions, karnaugh, submap, terms, symmetrizable,...
69
69
texts
eye 69
favorite 0
comment 0
We use the Maple system to check the investigations of S. S. Gupta regarding the Smarandache consecutive and the reversed Smarandache sequences of triangular numbers [Smarandache Notions Journal, Vol. 14, 2004, pp. 366–368]. Furthermore, we extend previous investigations to the mirror and symmetric Smarandache sequences of triangular numbers.
Topics: symmetric Smarandache sequences, triangular numbers
48
48
texts
eye 48
favorite 0
comment 0
In a number of preceding papers we introduced a new PT-symmetric periodic potential, derived from biquaternion radial Klein-Gordon equation. In the present paper we will review our preceding result, and continue with numerical solution of Gamow integral for that periodic potential. And then we also compare with other periodic potentials which are already known, such as Posch-Teller or Rosen-Morse potential. We also discuss a number of recent development in the context of condensed matter...
Topics: Klein-Gordon equation, PT-symmetric
21
21
Jul 25, 2013
07/13
by
Nathan Rae
audio
eye 21
favorite 0
comment 0
Leo and Steve continue their multi-episode tour of cryptographic technology. This week they analyze the cryptographic operation of secret decoder rings which we use to develop a solid foundation of cryptographic terminology. They then examine the first of two forms of symmetric, private key cryptography known as symmetric stream ciphers. Two weeks from now, after next week's Q&A episode, we'll discuss the operation of symmetric block ciphers.
Topics: Symmetric Stream Ciphers, Security, Then, Now
51
51
May 2, 2016
05/16
by
IASET JOURNALS
texts
eye 51
favorite 0
comment 0
A permutation polytope is the convex hull of permutation matrices. An example of permutation polytope is the Birkhoff polytope which is all doubly stochastic matrices, this polytope is defined as the convex hull of all permutation matrices.The aim of this paper is to prove an open conjecture about Birkhoff polytope and symmetric group, we want to prove that there a one to-one map from the verticesof the Birkhoff polytope and the symmetric group S n .
Topics: Birkhoff Polytope, Permutation Polytope, Symmetric Group
Journal of Research of the National Bureau of Standards
Topics: Characteristic roots, comparison theorems, symmetric functions
7
7.0
Nov 21, 2020
11/20
by
Michael Stephen Fiske
texts
eye 7
favorite 0
comment 0
Our goal is to construct mathematical operations that combine indeterminism measured from quantum randomness with computational determinism so that non-mechanistic behavior is preserved in the computation. Formally, some results about operations applied to computably enumerable (c.e.) and bi-immune sets are proven here, where the objective is for the operations to preserve bi-immunity. While developing rearrangement operations on the natural numbers, we discovered that the bi-immune...
Topics: computation, indeterminism, bi-immune, symmetric group
Journal of Research of the National Bureau of Standards
Topics: Matrix, principal submatrices, rank, symmetric matrix
Bell System Technical Journal, 49: 8. October 1970 pp 1991-1994. B.S.T.J. Briefs: All Terminal Bubbles Programs Yield the ElementarySymmetric Polynomials. (Kurshan, R.P.)
Topics: lemma, boolean, terminal, polynomial, magnetic, symmetric, domains, induction, expressions,...
With the progress in data exchange by the electronic system, the need for information security has become a necessity. Due to the growth of multimedia application, security becomes an important issue of communication and storage of different files. To make its reality, cryptographic algorithms are widely used as essential tools. Cryptographic algorithms provide security services such as confidentiality, authentication, data integrity and secrecy by encryption. Different cryptographic algorithms...
Topics: Computer Engineering, Symmetric, Asymmetric, encryption, TEA, Blowfish
Eigen face approach is one of the earliest face recognition approach introduced in the year 1991 by M. Turk and A. Pentland. It is a Principal Component Analysis (PCA) based approach. Initially, PCA decomposes the face image into a small set of characteristic features known as eigen faces, followed the computation of distance between the resultant position in the face space and the known face classes. This analysis reduces the dimensionality of the training set, leaving only those features that...
Topics: Symmetric Face Recognition Using Eigen Faces, PCA
Journal of Research of the National Bureau of Standards
Topics: Anticommuting, commutator, factorization, matrix, orthogonal, skew-symmetric
Topics: SYM4 (Computer program), Symmetric functions, VL1 system
Journal of Research of the National Bureau of Standards
Topics: Eigenvalues, matrix, principal submatrices, rank, symmetric matrix
The programmable logic array is one of the most fascinating and fast developing areas of technology. Field programmable gate arrays are becoming prevalent in design as the density of the gate arrays goes up. In this thesis study, a fast encoding/decoding algorithm, Extended Golay Coding, is implemented in Xilinx XC4000 family programmable gate array (FPGA) architecture. The encoder/decoder is designed using the Xilinx XACT tool with the Mentor Graphics schematic capture Design Architect (DA)...
Topics: Spinning Sphere, Rotationally Symmetric Flow, Spectral Methods
Journal of Research of the National Bureau of Standards
Topics: Cayley graph, circulant, cycle decomposition, edge-transitive graph, grouplike set, line-symmetric...
"NSF-OCA-GJ-36936-000008."
Topics: Eigenvalues, Parallel processing (Electronic computers), Symmetric matrices
This paper presents an adaptive control scheme for systems with uncertain asymmetrical deadzone nonlinearity at the input of a linear plant. An adaptive inverse block has been developed and used in conjunction with any conventional controllers in order to reduce the effect of deadzone nonlinearity. The deadzone inverse model is non‐symmetric and implemented in continuous time. The adaptive deadzone inverse controller is smoothly differentiable and can easily be combined with any of the...
Topics: Adaptive Control, Non‐Symmetric Deadzone, Hard Nonlinearity
Eigen face approach is one of the earliest face recognition approach introduced in the year 1991 by M. Turk and A. Pentland. It is a Principal Component Analysis (PCA) based approach. Initially, PCA decomposes the face image into a small set of characteristic features known as eigen faces, followed the computation of distance between the resultant position in the face space and the known face classes. This analysis reduces the dimensionality of the training set, leaving only those features that...
Topics: Symmetric Face Recognition Using Eigen Faces, PCA
The Internet is an evolving, robust system with built in redundancy to ensure the flow of information regardless of any act of nature or man-made event. This makes mapping the Internet a daunting task, but important because understanding its structure helps identifying vulnerabilities and possibly optimizing traffic through the network. We explore CAIDA’s and NPS’s probing methodologies to verify the assentation that NPS’s probing methodology discovers comparable Internet topologies in...
Topics: Distance, dissimilarity between graphs, symmetric difference, Internet topology
Converting a plain text into non readable format to maintain a confidentiality and integrity of data is called Encoding. And the technique used to decode that into readable format, is called Decryption. To encrypt and decrypt, algorithms we have developed. This entire theory, The whole technology is called Cryptography. Many algorithms were developed, many are Decoded, and many of the algorithms are still running nowadays also. So, here I came up with the new algorithm, with new technique, with...
Topics: Information Security, Integrity, Encryption, Decryption, Symmetric Algorithm, Cipher
Bell System Technical Journal, 53: 4. April 1974 pp 557-580. Statistical Properties of a Sum of Sinusoids and Gaussian Noise and its Generalization to Higher Dimensions. (Goldman, Joel)
Topics: gaussian, sinusoids, vector, independent, theorem, vectors, plots, random, symmetric, esposito,...
From the bitsavers.org collection, a scanned-in computer-related document. mit :: ai :: aim :: AIM-1409
Topics: views, recognition, objects, symmetric, virtual, symmetry, object, view, poggio, model, virtual...
From the bitsavers.org collection, a scanned-in computer-related document. univOfTasmania :: Elliott503 :: Hydro-University Computing Centre Classifications Nov72
Topics: matrix, complex, symmetric, eigenvalues, linear, mgr, eigenvectors, triangular, tridiagonal,...
98
98
Dec 6, 2013
12/13
by
Debasish Pal & Debajyoti Choudhuri
texts
eye 98
favorite 0
comment 0
In this paper we proposed two formulae to calculate the number of elements of prime order of a finite group. The first one is used to calculate the number of prime order elements of a given direct product representation of an Abelian group for a given positive integer. The second one is used to determine the total number of elements of prime order in a symmetric group of degree n .
Topics: Abelian Group, Direct Product, Prime Order, Symmetric Group
Journal of Research of the National Bureau of Standards
Topics: Matrices, P-condition number, positive roots, symmetric functions
Journal of Research of the National Bureau of Standards
Topics: Diophantine equations, Prouhet-Tarry-Escott problem, symmetric functions
From the bitsavers.org collection, a scanned-in computer-related document. mit :: ai :: aim :: AIM-710
Topics: set, symmetry, subset, die, axioms, equals, isomorphism, symmetric, essential, notion, set theory,...
64
64
texts
eye 64
favorite 0
comment 0
In the era of Internet, the multimedia data can be used by anyone. There is a chance that unintended users get access to the data so, encryption is needed to hide the multimedia data from the unauthorized users. This paper proposes a modified binary encryption algorithm based on diffuse representation. Here a binary image is XORed with a random matrix and is divided into more number of non-overlapping sub-images. The modified encryption algorithm will produce an encrypted image with ¼th of...
Topics: BER, Encryption, Private Key Encryption, PSNR, Symmetric Encryption.
27
27
Oct 30, 2018
10/18
by
Xe1phix
movies
eye 27
favorite 0
comment 0
##-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-##" [+] Encrypts $File With A Symmetric Cipher Encryption (Using A Passphrase):" ##-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-##" ## ------------------------------------------------------------------------------- ## ## [?] Uses The AES-256 Cipher Algorithm To Encrypt The Passphrase ## [?] Uses The SHA-512 Digest Algorithm To Mangle The Passphrase ## ...
Topics: Encrypt, Encryption, Xe1phix, GnuPG, gpg, symmetric, AES-256
297
297
Apr 24, 2011
04/11
by
Raman V
texts
eye 297
favorite 0
comment 0
symmetric, dihedral, dicyclic, cyclic, abelian, alternating, Frobenius, quarternion, direct product, semi-direct product, list of all other such types of groups symmetric, dihedral, dicyclic, cyclic, abelian, alternating, Frobenius, including up with all that such type of group structures within that provided document file
Topics: symmetric, dihedral, dicyclic, cyclic, abelian, alternating, Frobenius, groups